14.04.2015 Views

LA0jD

LA0jD

LA0jD

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TREND MICRO | TrendLabs 2014 Targeted Attack Campaign Report<br />

16. Jay Yaneza. (29 December 2014). TrendLabs Security Intelligence Blog. “64-bit Version of HAVEX Spotted.” Last accessed on 28<br />

March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/64-bit-version-of-havex-spotted/.<br />

17. Trend Micro Incorporated. (5 December 2014). TrendLabs Security Intelligence Blog. “WIPALL Malware Leads to #GOP Warning<br />

in Sony Hack.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/wipall-malwareleads-to-gop-warning-in-sony-hack/.<br />

18. Command Five Pty. Ltd. (September 2011). Command Five. “SK Hack by an Advanced Persistent Threat.” Last accessed on 28<br />

March 2015, https://www.commandfive.com/papers/C5_APT_SKHack.pdf.<br />

19. Benson Sy. (19 January 2015). TrendLabs Security Intelligence Blog. “PlugX Malware Found in Official Releases of League of<br />

Legends, Path of Exile.” Last accessed 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/plugxmalware-found-in-official-releases-of-league-of-legends-path-of-exile/.<br />

20. Christopher Daniel So. (18 August 2014). TrendLabs Security Intelligence Blog. “BIFROSE Now More Evasive Through Tor, Used<br />

for Targeted Attack.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/bifrose-nowmore-evasive-through-tor-used-for-targeted-attack/.<br />

21. Maersk Menrige. (25 June 2014). TrendLabs Security Intelligence Blog. “PlugX RAT with ‘Time Bomb’ Abuses Dropbox for<br />

Command-and-Control Settings.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/<br />

plugx-rat-with-time-bomb-abuses-dropbox-for-command-and-control-settings/.<br />

22. Trend Micro Incorporated. (12 May 2014). TrendLabs Security Intelligence Blog. “Targeted Attack Against Taiwanese Agencies<br />

Used Recent Microsoft Word Zero Day.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-securityintelligence/targeted-attack-against-taiwanese-agencies-used-recent-microsoft-word-zero-day/.<br />

23. Microsoft. (2014). Security TechCenter. “Microsoft Security Bulletin MS14-021—Critical.” Last accessed on 28 March 2015,<br />

https://technet.microsoft.com/library/security/ms14-021.<br />

24. William Gamazo Sanchez. (10 November 2014). TrendLabs Security Intelligence Blog. “Timeline of Sandworm Attacks.” Last<br />

accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/timeline-of-sandworm-attacks/.<br />

25. Jonathan Leopando. (21 October 2014). TrendLabs Security Intelligence Blog. “Microsoft Windows Hit by New Zero-Day Attack.”<br />

Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/microsoft-windows-hit-by-newzero-day-attack/.<br />

26. Kervin Alintanahin. (17 June 2014). TrendLabs Security Intelligence Blog. “PLEAD Targeted Attacks Against Taiwanese<br />

Government Agencies.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/pleadtargeted-attacks-against-taiwanese-government-agencies-2.<br />

27. Jayronn Christian Bucu. (18 September 2014). TrendLabs Security Intelligence Blog. “EvilGrab Malware Family Used in Targeted<br />

Attacks in Asia.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/evilgrab-malwarefamily-used-in-targeted-attacks-in-asia/.<br />

28. Loucif Kharouni. (2014). Trend Micro Security Intelligence. “Cybercriminals Use What Works: Targeted Attack Methodologies for<br />

Cybercrime.” Last accessed on 28 March 2015, http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/whitepapers/wp-cybercriminals-use-what-works.pdf.<br />

29. Trend Micro Incorporated. (2015). Trend Micro. “Deep Discovery: Advanced Network Security.” Last accessed on 1 April 2015,<br />

http://www.trendmicro.com/us/enterprise/security-risk-management/deep-discovery/.<br />

30. Trend Micro Incorporated. (2015). Trend Micro. “Custom Defense Against Targeted Attacks.” Last accessed on 6 April 2015,<br />

http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_custom-defense-against-targeted-attacks.pdf.<br />

32 | Targeted Attack Trends

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!